KR20170104761A - Method for enhancing one-time-password certification using multiple one-time-password - Google Patents
Method for enhancing one-time-password certification using multiple one-time-password Download PDFInfo
- Publication number
- KR20170104761A KR20170104761A KR1020160027546A KR20160027546A KR20170104761A KR 20170104761 A KR20170104761 A KR 20170104761A KR 1020160027546 A KR1020160027546 A KR 1020160027546A KR 20160027546 A KR20160027546 A KR 20160027546A KR 20170104761 A KR20170104761 A KR 20170104761A
- Authority
- KR
- South Korea
- Prior art keywords
- otp
- authentication
- value
- generation device
- certification
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
The present invention relates to a technique for enhancing authentication using OTP (One Time Password), and more particularly, to a method for enhancing OTP authentication using a plurality of OTPs capable of enhancing security by performing authentication based on a plurality of OTPs.
User authentication method based on ID / Password is the most used method, but it has security vulnerability that it can be hacked by an attacker. OTP (One Time Password) technology has recently been widely used as a method for enhancing security through a one-time password that can replace the existing fixed password as one of countermeasures to solve the security vulnerability. In addition to the existing ID / Password method, OTP is used as a secondary user authentication method. In particular, OTP has become a means of enhancing security in online games, mobile banking for payment transactions, and online games for payment There is a trend.
The OTP generates a new password every time the user authenticates. The once-used password can not be reused. The OTP generation algorithm uses a one-way hash function to provide strong security that the password can not be guessed. That is, the user is authenticated through whether or not the one-time password value generated between the user and the authentication server is the same. Since the one-time password to be used is not reused and the password can not be inferred, secure user authentication is possible it means.
There are various ways of implementing the OTP generation function such as time synchronization method, event method, and query response method. This type of separation is based on how the OTP generator and the authentication server periodically obtain the same input value and generate the same OTP on both sides. In recent years, OTP values are automatically Generated time synchronization methods or methods based thereon are mainly used.
In order to use the OTP method, the authentication server side may implement a separate OTP authentication server or add an OTP authentication module to the existing authentication server. In addition, a user needs a device for generating an OTP. The OTP generating device on the user side is divided into two types. The first is hardware-based OTP token or OTP card which is widely used in existing financial institutions (which some game companies initially used). When a user carries such a device and uses a financial transaction or the like, the user views the OTP value generated and displayed by the device and inputs the same to another device (PC or mobile device) that executes financial transactions. The second is mobile OTP, which is software OTP implemented on mobile devices such as smartphones, which are widely used recently, and this is increasingly used mainly in games and portal sites. The advantage of this method is that an OTP can be created on an individual mobile device without carrying additional OTP devices. In other words, the OTP value is output to the screen of the mobile device, and is used as a value to be inputted by the user when it is mainly connected to the PC-based portal or game. In the latter case, it is impossible to use it for financial transactions in Korea because of security problem.
In recent years, OTP generation devices have been diversified as well as various hardware devices due to the development of IoT technology. In particular, hardware-based OTP generation devices include a USIM-based OTP generation device, an SE-based OTP generation device, OTP creation using user portable devices such as other wearable devices is also possible. In addition, devices equipped with an existing OTP token and an OTP card equipped with a local wireless communication function and capable of transmitting OTP values directly generated without a user's input to a client device such as a mobile terminal have been developed.
However, the OTP authentication method using such OTP generation devices has the following security and operational problems. First, it is a problem that users may be damaged by loss. The OTP generating device is a device used for financial transaction of a user, and can be directly connected with the financial damage of the user. Next, when the user's basic information (seed value) related to the OTP generation due to the insider is lost on the authentication server side, the OTP authentication actually loses security function. In addition, although the USIM or SE-based OTP device mounted on a mobile device is not a hardware OTP generation device in the present financial system, it is not recognized as an OTP generation device according to the principle of media separation. However, a hardware-based OTP But also has the problem of efficiency that the generating device is not actually used.
An object of the present invention is to enhance the security of OTP authentication by utilizing a plurality of OTP generation devices.
It is also an object of the present invention to prevent damage to a user due to loss of the OTP generating device.
It is another object of the present invention to protect a user from financial damage due to leakage of a seed value due to an authentication server insider through multiple authentication servers.
It is also an object of the present invention to improve the usability of existing devices by using devices that are not recognized as OTP authentication devices in the financial sector as secondary OTP generation devices.
According to another aspect of the present invention, there is provided a method for enhancing OTP authentication using a plurality of OTPs according to the present invention, in which an OTP generation request is generated in an OTP authentication client, and a first OTP generation device transmits an execution request to a second OTP generation device ; The second OTP generation device generates a second OTP value based on the second OTP important data and transmits the second OTP value to the first OTP generation device, and the first OTP generation device transmits the first OTP important data and the second OTP value Generating a first OTP value based on the first OTP value; The OTP authentication client transmitting the first OTP value to a first authentication server, the first authentication server receiving the first OTP value and requesting a second authentication server to generate an OTP value for authentication; And the first authentication server generates an OTP value for final authentication based on the OTP value for authentication, performs OTP authentication, and transmits an OTP authentication result to the OTP authentication client.
According to the present invention, the security of OTP authentication can be enhanced by utilizing a plurality of OTP generation devices.
In addition, the present invention can prevent damage to a user due to loss of the OTP generation device.
In addition, the present invention can protect a user from being financially damaged by leakage of a seed value due to an authentication server insider through multiple authentication servers.
In addition, the present invention can improve the usability of existing devices by using devices that are not recognized as OTP authentication devices in the financial sector as second OTP generation devices.
1 is a flowchart illustrating an OTP authentication enforcement method using a plurality of OTPs according to an exemplary embodiment of the present invention.
2 is a diagram illustrating a configuration of an OTP authentication system for OTP authentication according to an embodiment of the present invention.
3 is a block diagram illustrating an OTP authentication enforcement system using a plurality of OTPs according to an embodiment of the present invention.
4 is a diagram illustrating an input data structure of a first OTP generation apparatus and an input data structure of a second OTP generation apparatus according to an embodiment of the present invention.
5 to 6 are views showing a connection structure of a plurality of OTP generation devices according to an embodiment of the present invention.
7 is a detailed flowchart illustrating an OTP authentication method using a plurality of OTPs according to an exemplary embodiment of the present invention.
The present invention will now be described in detail with reference to the accompanying drawings. Hereinafter, a repeated description, a known function that may obscure the gist of the present invention, and a detailed description of the configuration will be omitted. Embodiments of the present invention are provided to more fully describe the present invention to those skilled in the art. Accordingly, the shapes and sizes of the elements in the drawings and the like can be exaggerated for clarity.
Hereinafter, preferred embodiments according to the present invention will be described in detail with reference to the accompanying drawings.
1 is a flowchart illustrating an OTP authentication enforcement method using a plurality of OTPs according to an exemplary embodiment of the present invention.
Hereinafter, the OTP authentication enforcement method will be described with reference to FIG. 1 for limiting the number of OTP generating apparatuses to two for convenience of explanation. However, the method proposed by the present invention utilizes two or more OTP generation devices, and it is possible to use two or more arbitrary OTP generation devices. In the present invention, the OTP generation method used by the OTP generation apparatus will be described based on the time synchronization method. However, the method of enhancing OTP authentication according to an embodiment of the present invention may be changed to various OTP generation methods according to an application.
Referring to FIG. 1, an OTP authentication method using a plurality of OTPs according to an exemplary embodiment of the present invention is a method in which an OTP generation request is generated in an OTP authentication client, a first OTP generation device sends an execution request (S110).
In this case, the OTP authentication client may refer to a device including an OTP authentication requesting a user to input an OTP value in the course of execution of a web or other program. For example, a mobile terminal such as a smart phone or a PC may operate as an OTP authentication client.
In this case, the OTP generation device corresponds to a device for generating a one-time password for user authentication, and may refer to a hardware-based OTP generation device, not software.
In addition, it may refer to an OTP generation apparatus having a function of transmitting a generated OTP value to an OTP authentication client or having a wireless communication function based on a near-field communication with other OTP apparatuses. For example, the OTP generation apparatus according to the present invention may include hardware-based OTP generation apparatuses utilizing portable devices such as OTP token, OTP card, USIM or SE-based OTP, and other wearables.
At this time, the first OTP generation device corresponds to the first device that generates the OTP, and may request the second OTP generation device corresponding to the second device to generate and transmit the OTP. Also, the second device receives the OTP value and can use it as an input for generating the OTP value for authentication.
Thus, the first OTP generation device may be limited to hardware-based OTP devices available in the financial sector.
In this case, the second OTP generation device corresponds to the second OTP generation device. When the first OTP generation device requests OTP generation, the second OTP generation device generates an OTP and responds to the first OTP generation device . At this time, the second OTP generation device may be limited to a hardware-based OTP generation device. That is, the second OTP generation device may correspond to USIM or SE based hardware OTP generation devices that are not recognized in the financial sector.
At this time, the first OTP generation apparatus can be driven by an instruction of the OTP authentication client or by a direct drive by the user.
Also, in the OTP authentication enhancement method using a plurality of OTPs according to an embodiment of the present invention, the second OTP generation device generates a second OTP value based on the second OTP important data and transmits the second OTP value to the first OTP generation device, The first OTP generation apparatus generates a first OTP value based on the first OTP important data and the second OTP value (S120).
In this case, the OTP value may refer to the disposable password of the user generated through the OTP generation device.
At this time, the first OTP value may correspond to the disposable password of the user generated through the first OTP generation device.
At this time, the second OTP value may correspond to the disposable password of the user generated through the second OTP generation device.
In this case, the OTP important data may mean Seed information or user specific information used as a basic input value to generate the OTP value. In addition, the OTP important data may be registered with the same value in the authentication server that requests authentication in the issuing process of the OTP generating device. That is, it can be assumed that OTP important data is registered in advance in the authentication server before OTP authentication is performed.
At this time, the first OTP important data may correspond to the OTP important data stored in the first OTP generator and the first authentication server.
At this time, the second OTP important data may correspond to the OTP important data stored in the second OTP generating device and the second authentication server.
The OTP authentication method using a plurality of OTPs according to an embodiment of the present invention is a method in which an OTP authentication client transmits a first OTP value to a first authentication server and a first authentication server receives a first OTP value, 2 authentication server to generate an OTP value for authentication (S130).
In this case, the authentication server may mean a server device that performs user authentication, i.e., OTP authentication, by comparing whether the OTP value transmitted by the OTP authentication client is the same as the OTP value generated for the corresponding user registered in the authentication server have. In this case, if the compared values are the same, it may mean that the authentication is successful.
At this time, the first authentication server may be a first authentication server that authenticates the OTP value transmitted by the OTP authentication client, and may request the second authentication server to generate and transmit an authentication OTP value for the user. Thereafter, the first authentication server generates an OTP value for final authentication for the user by using the OTP value for authentication as one input value, and determines whether the OTP value for final authentication is the same as the OTP value transmitted by the OTP authentication client And perform user authentication.
At this time, the second authentication server is a second authentication server for authenticating the OTP value transmitted by the OTP authentication client, and generates an OTP value for authentication when it is requested to generate an OTP value for authentication for the user from the first authentication server And respond to the first authentication server. That is, the second authentication server does not take charge of checking whether the OTP value is actually the same internally, and takes charge of the role of generating the OTP value for authentication using the information stored in the second authentication server for the user .
Also, in the OTP authentication enhancement method using a plurality of OTPs according to an embodiment of the present invention, the first authentication server generates an OTP value for final authentication based on the OTP value for authentication, performs OTP authentication, To the OTP authentication client (S140).
At this time, the OTP value for final authentication may be compared with the first OTP value, and OTP authentication may be performed depending on whether or not they match.
For example, if the OTP value for final authentication matches the first OTP value, it is determined that OTP authentication is successful and the authentication success result can be transmitted to the OTP authentication client.
For example, if the OTP value for final authentication does not match the first OTP value, it is determined that the OTP authentication has failed and the authentication failure result can be transmitted to the OTP authentication client.
The security of OTP authentication can be enhanced by utilizing a plurality of OTP generation devices through the OTP authentication enhancement method using a plurality of OTPs.
In addition, it is possible to prevent the user from being damaged due to the loss of the OTP generating device.
In addition, it is possible to prevent the user from being financially damaged by leakage of the seed value due to the authentication server insider through the multiple authentication servers.
In addition, the utilization of existing devices can be improved by using the devices that are not recognized as OTP authentication devices in the financial sector as a secondary OTP generation device.
2 is a diagram illustrating a configuration of an OTP authentication system for OTP authentication according to an embodiment of the present invention.
2, in the OTP authentication system for OTP authentication according to the embodiment of the present invention, the
At this time, when the input OTP value is equal to the OTP value generated by the
3 is a block diagram illustrating an OTP authentication enforcement system using a plurality of OTPs according to an embodiment of the present invention.
Referring to FIG. 3, an operation of the OTP authentication enforcement system using a plurality of OTPs according to an embodiment of the present invention will be described through an OTP value generation process.
First, when the
Thereafter, the first
Thereafter, the second
Thereafter, the second
Thereafter, the first
Thereafter, the output first OTP value becomes the OTP value requested by the
Hereinafter, the operation of the OTP authentication enhancement system will be described through the process of generating OTP values for authentication for OTP authentication.
First, when the
After that, the
Thereafter, the
Thereafter, the
Thereafter, the
If the two values do not match, it is determined that the OTP authentication has failed and the authentication result can be transmitted to the
4 is a diagram illustrating an input data structure of a first OTP generation apparatus and an input data structure of a second OTP generation apparatus according to an embodiment of the present invention.
Referring to FIG. 4, a first OTP value 420 according to an embodiment of the present invention is transmitted to a second OTP generating device, which includes a second OTP important data 411 and a second OTP value 412 generated using time information 412, Value < RTI ID = 0.0 > 410 < / RTI >
That is, when an OTP authentication request is generated from the OTP authentication client, the first OTP generation device may instruct the second OTP generation device to generate the second OTP value. At this time, the second OTP generation apparatus may generate a second OTP value 410 as shown in FIG. 4 and provide it to the first OTP generation apparatus.
Thereafter, the first OTP generating device may generate the first OTP value 420 using the second OTP value 410 together with the first OTP important data 421 and the time information 422.
5 to 6 are views showing a connection structure of a plurality of OTP generation devices according to an embodiment of the present invention.
5 to 6, the connection structure of a plurality of OTP generation devices according to an exemplary embodiment of the present invention may be extended as the OTP authentication device increases, and may be broadly divided into two types.
First, as shown in FIG. 5, a plurality of OTP generation devices under the first
6, the second
In this case, input data structures of all OTP generation devices except for the Nth
7 is a detailed flowchart illustrating an OTP authentication method using a plurality of OTPs according to an exemplary embodiment of the present invention.
Referring to FIG. 7, in step S702, the OTP authentication method using the plurality of OTPs according to an exemplary embodiment of the present invention may first request OTP authentication by the OTP authentication client.
Thereafter, the first OTP generation apparatus is activated (S704), and the first OTP generation apparatus can request the second OTP generation apparatus to execute (S706).
Thereafter, the second OTP generation device may generate a second OTP value based on the second OTP important data and the time information of the corresponding user, and may transmit the second OTP value to the first OTP generation device (S708).
Thereafter, the first OTP generation device receives the second OTP value, and generates the first OTP value based on the second OTP value, the first OTP important data and the time information of the user (S710).
Thereafter, the first OTP generation apparatus can forward the first OTP value to the OTP authentication client (S712).
Thereafter, the OTP authentication client can transmit an authentication message including the first OTP value to the first authentication server (S714).
Thereafter, the first authentication server receives the first OTP value and may request the second authentication server to generate the OTP value for authentication to generate the OTP value for final authentication (S716).
Thereafter, the second authentication server generates an OTP value for authentication based on the second OTP important data and time information, and transmits the generated OTP value for authentication to the first authentication server (S718).
Thereafter, the first authentication server may generate an OTP value for final authentication based on the OTP value for authentication, the first OTP important data, and the time information (S720).
Thereafter, it is determined whether the first OTP value matches the OTP value for final authentication (S722). If the first OTP value and the last OTP value match, the OTP authentication success is confirmed and the authentication result is transmitted to the OTP authentication client (S724).
If the result of step S722 does not match, the OTP authentication failure is confirmed and the authentication result can be transmitted to the OTP authentication client (S726).
As described above, the OTP authentication enhancement method using a plurality of OTPs according to the present invention is not limited to the configuration and method of the embodiments described above, but the embodiments may be modified in various ways All or some of the embodiments may be selectively combined.
210, 310: OTP authentication client 220: OTP generation device
230: Authentication server
320, 510, 610: first
330: first authentication server 331: second authentication server
410: second OTP value 411: second OTP important data
412, 421: Time information 420: First OTP value
421: First OTP critical data 510-2, 630: Third OTP generation device
510-N, 640: Nth OTP generation device
Claims (1)
The second OTP generation device generates a second OTP value based on the second OTP important data and transmits the second OTP value to the first OTP generation device, and the first OTP generation device transmits the first OTP important data and the second OTP value Generating a first OTP value based on the first OTP value;
The OTP authentication client transmitting the first OTP value to a first authentication server, the first authentication server receiving the first OTP value and requesting a second authentication server to generate an OTP value for authentication; And
The first authentication server generates an OTP value for final authentication based on the OTP value for authentication to perform OTP authentication and transmits an OTP authentication result to the OTP authentication client
Wherein the OTP authentication method comprises:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160027546A KR102000164B1 (en) | 2016-03-08 | 2016-03-08 | Method for enhancing one-time-password certification using multiple one-time-password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160027546A KR102000164B1 (en) | 2016-03-08 | 2016-03-08 | Method for enhancing one-time-password certification using multiple one-time-password |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170104761A true KR20170104761A (en) | 2017-09-18 |
KR102000164B1 KR102000164B1 (en) | 2019-07-16 |
Family
ID=60034282
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160027546A KR102000164B1 (en) | 2016-03-08 | 2016-03-08 | Method for enhancing one-time-password certification using multiple one-time-password |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR102000164B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102453310B1 (en) * | 2022-06-20 | 2022-10-11 | 주식회사 피씨티 | Method and System for Provide OTP |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080075964A (en) | 2007-02-14 | 2008-08-20 | 에스케이씨앤씨 주식회사 | Method for multiple registration of an otp authentication device |
KR20100104161A (en) * | 2009-03-16 | 2010-09-29 | 김세용 | Apparatus and method for creating anti-phishing otp |
KR20130055829A (en) * | 2011-11-21 | 2013-05-29 | 삼성에스디에스 주식회사 | Time based authentication system and method thereof |
JP2014052905A (en) * | 2012-09-07 | 2014-03-20 | Fuji Electric Co Ltd | Control device, control system, password verification method, and program |
-
2016
- 2016-03-08 KR KR1020160027546A patent/KR102000164B1/en active IP Right Grant
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080075964A (en) | 2007-02-14 | 2008-08-20 | 에스케이씨앤씨 주식회사 | Method for multiple registration of an otp authentication device |
KR20100104161A (en) * | 2009-03-16 | 2010-09-29 | 김세용 | Apparatus and method for creating anti-phishing otp |
KR20130055829A (en) * | 2011-11-21 | 2013-05-29 | 삼성에스디에스 주식회사 | Time based authentication system and method thereof |
JP2014052905A (en) * | 2012-09-07 | 2014-03-20 | Fuji Electric Co Ltd | Control device, control system, password verification method, and program |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102453310B1 (en) * | 2022-06-20 | 2022-10-11 | 주식회사 피씨티 | Method and System for Provide OTP |
Also Published As
Publication number | Publication date |
---|---|
KR102000164B1 (en) | 2019-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ES2818199T3 (en) | Security verification method based on a biometric characteristic, a client terminal and a server | |
US12041039B2 (en) | System and method for endorsing a new authenticator | |
KR102358546B1 (en) | System and method for authenticating a client to a device | |
JP6921222B2 (en) | Encryption key management based on ID information | |
CN104065653B (en) | A kind of interactive auth method, device, system and relevant device | |
US9225717B1 (en) | Event-based data signing via time-based one-time authentication passcodes | |
US20140298412A1 (en) | System and Method for Securing a Credential via User and Server Verification | |
US20070130472A1 (en) | System and method for securely provisioning and generating one-time-passwords in a remote device | |
JP2018515011A (en) | Method and apparatus for authenticating user, method and apparatus for registering wearable device | |
US10057254B2 (en) | Mobile terminal for providing one time password and operating method thereof | |
Archana et al. | Survey on usable and secure two-factor authentication | |
EP2798774A1 (en) | Method, device, and system for managing user authentication | |
EP3206329B1 (en) | Security check method, device, terminal and server | |
CN109587164A (en) | A kind of information encrypting transmission method, device, equipment and storage medium | |
CN103136485B (en) | A kind of method realizing computer security and computer | |
EP3847603B1 (en) | System and method for payment authentication | |
CN108881243A (en) | (SuSE) Linux OS login authentication method, equipment, terminal and server based on CPK | |
KR102000164B1 (en) | Method for enhancing one-time-password certification using multiple one-time-password | |
US20230093667A1 (en) | Method of providing login information and electronic device performing thereof | |
CN201577098U (en) | Information security verification equipment | |
US20230196376A1 (en) | Multi-Factor User Authentication | |
Kumari et al. | Hacking resistance protocol for securing passwords using personal device | |
CN112449143B (en) | Implementation method and implementation system of secure video | |
KR20160007153A (en) | Financial transaction system using security intensification one time password and method thereof | |
Liou | Performance measures for evaluating the dynamic authentication techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
AMND | Amendment | ||
E902 | Notification of reason for refusal | ||
AMND | Amendment | ||
E601 | Decision to refuse application | ||
AMND | Amendment | ||
X701 | Decision to grant (after re-examination) | ||
GRNT | Written decision to grant |